Description:
Several potential vulnerabilities have been reported in the Ethereal network sniffer. A remote user could cause the sniffer to crash or possibly execute arbitrary code.

According to the vendor, there are several bugs in Ethereal that could be exploited by remote users. A remote user could send a specially crafted packet over the network that Ethereal is monitoring to trigger these vulnerabilities. These security holes can also be triggered when a local user opens a malformed packet trace file.

The bugs are reported to exist in the following components:

- SMB dissector; a remote user could dereference a NULL pointer in two cases.
- X11 dissector; a remote user could trigger a buffer while parsing keysyms.
- DNS dissector; a remote user could create a malformed packet to cause this module to enter an infinite loop.
- GIOP dissector; a remote user could cause this module to allocate large amounts of memory.

Impact:
A remote user could cause Ethereal to hang or to crash or execute arbitrary code.

Users of Conectiva Linux version 6.0 or higher may use apt to perform upgrades of RPM packages:
- add the following line to /etc/apt/sources.list if it is not there yet (you may also use linuxconf to do this):

rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

- run: apt-get update
- after that, execute: apt-get upgrade

Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --------------------------------------------------------------------------
PACKAGE : ethereal
SUMMARY : Several vulnerabilities
DATE : 2002-07-04 14:42:00
ID : CLA-2002:505
RELEVANT
RELEASES : 6.0, 7.0, 8
- -------------------------------------------------------------------------
DESCRIPTION
Ethereal is a powerful network traffic analyzer with an intuitive
interface.
This update addresses several vulnerabilities in ethereal <= 0.9.4 as
stated[1][2] in the project's home page. The following protocol
dissectors were vulnerable to various kinds of attacks (mainly DoS
and arbitrary code execution): BGP, X11, DNS, GIOP, WCP, SOCKS, RSVP,
AFS and LMP.
These vulnerabilities can be exploited by an attacker who can insert
crafted packets in the wire being monitored by ethereal or make an
user open a trace file with such packets inside.
SOLUTION
All ethereal users should upgrade their packages.
REFERENCES:
1.http://www.ethereal.com/appnotes/enpa-sa-00004.html
2.http://www.ethereal.com/appnotes/enpa-sa-00005.html
DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/ethereal-0.9.5-1U60_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/ethereal-0.9.5-1U60_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/ethereal-0.9.5-1U70_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/ethereal-0.9.5-1U70_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-0.9.5-1U8_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-common-0.9.5-1U8_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-gtk-0.9.5-1U8_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/ethereal-utils-0.9.5-1U8_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/tethereal-0.9.5-1U8_2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/ethereal-0.9.5-1U8_2cl.src.rpm
ADDITIONAL INSTRUCTIONS
Users of Conectiva Linux version 6.0 or higher may use apt to perform
upgrades of RPM packages:
- add the following line to /etc/apt/sources.list if it is not there yet
(you may also use linuxconf to do this):
rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
(replace 6.0 with the correct version number if you are not running CL6.0)
- run: apt-get update
- after that, execute: apt-get upgrade
Detailed instructions reagarding the use of apt and upgrade examples
can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en
- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE9JInD42jd0JmAcZARAlIKAKCZMp3KJKE/p2+XZOpBP0SnwgTNPwCgywp2
USgMD1wKVgM5oM5pw5qt8RA=
=QRxm
-----END PGP SIGNATURE-----